Comp Notes
Comp Notes
Contents
Note From Author ..................................................................................................................................... 2
Differences ................................................................................................................................................ 3
URLs ............................................................................................................................................................ 3
Parts ........................................................................................................................................................ 3
Cookies ........................................................................................................................................................ 6
Cookie Types......................................................................................................................................... 6
Uses .......................................................................................................................................................... 9
Data Interception............................................................................................................................ 14
Hacking ............................................................................................................................................... 17
Malware .............................................................................................................................................. 18
Phishing............................................................................................................................................... 21
Pharming............................................................................................................................................ 23
Social Engineering........................................................................................................................... 24
Anti-Malware ................................................................................................................................... 27
Authentication ................................................................................................................................. 28
I just wanted to tell you that you SHOULD USE OTHER RESOURCES!!!
You can find these resources from many useful places like r/IGCSE!
You can get many past papers from places like dynamic papers or papa Cambridge.
Differences
Internet World Wide Web (WWW)
System of interconnected computer
Online content (like web pages)
networks.
Allow communication between HTTP(S) protocols are written using
computers (like emails or calls) HMTL
Use transmission protocols (TCP) & Use Uniform Resource Locator (URLs)
Internet Protocols (IP) are used to locate web pages.
URLs
A Uniform Resource Locator (URL) is a text-based address which is used to access a
Parts
HTTP is a set of rules that must be obeyed when transferring files over the internet.
When we use security (like SSL or TLS), we use HTTPS (“S” means Security &
Web Browsers
A web browser is a software which renders HTML (Hypertext Markup Language) &
Common Features
Feature Description
Homepage The page shown when software is opened.
Bookmarks Stores user’s favourite webpages for later use.
Keeps a list of websites visited by the user in chronological
User History
order.
Multi-Tabs Allows user to have multiple tabs open at the same time.
Cookies Details Here
Allows user to go to other opened webpages, pages opened
Navigation Tools
before or after and much more.
This is a box where we can enter the URL of a website and we
Address Bar
will be presented with the website.
remember IP addresses but URLs, we enter that instead, the browser asks a DNS
Cookies
Cookies are small files or code stored on the user’s computer.
Cookies store data of a user like previous browser history, currency, language, etc.
Cookie Types
There are 2 types of cookies:
Session Cookies
These are cookies that stay until the user closes the website or the browser.
This type of cookie does not really collect any user information & cannot personally
Persistent Cookies
These cookies stay on the user’s system even after the close the site or browser.
They are stored on the hard drive of the computer & are deleted once they reach
They also store user preferences to recommend them other content which they may
Digital Currency
What Is It?
Digital currency is currency that exists in digital format and is an accepted form of
payment to pay for goods & services, it also allows online banking & smartphone
Centralization Decentralization
This is when the transactions are This is when the transactions take place
processed through the central bank. directly between the 2 people.
No country controls cryptocurrencies & the rules are set by the cryptocurrency
community.
Transactions made using crypto can be tracked and are visible to the public.
The Blockchain
The cryptocurrency system works within the blockchain, this makes it more secure.
connected to a central server, this means that transaction data is stored on all the
Uses
No. Use
1 Cryptocurrency exchanges
2 Smart contracts
3 Research (pharmaceutical companies)
4 Politics
5 Education
How It Works
Whenever a new transaction takes place, a new block is created.
Every time a block is created, it is given a new hash value and is unique to every
Structure
One thing to know is that the hash of a block changes when the data is changed.
When the hash is changed, the chain of blocks is broken as the previous hash of the
Proof of Work
There is still one problem, what if the criminal makes a completely new chain like
We have some special network users called “miners” who are given a commission for
This means the entire process of chain creation is slowed down which makes it even
Every miner has a copy of the blockchain system, they get a copy of the newly
created block.
Cyber Security
Cyber security threats are the ways which can cause data to be intercepted
They usually try using the common passwords to make it faster (like 12345).
They also have a word list which is a text file with many words that may be the
password.
Data Interception
This is when someone tries stealing data by tapping into a wired/wireless connection.
examines the data packets being sent over a network and sends them to the hacker.
The intercepted Wi-Fi signals reveal personal information of the victim without the
Prevention
As we know, encryption makes it a bit hard for the hacker to understand the
content, we can make it even harder using Wired Equivalency Privacy (WEP) to
We should also use complex passwords for your wireless routers & refrain from using
DoS Attacks
Denial of Service (DoS) attacks is an attempt of preventing anyone from accessing
DoS attacks can also happen to users, this prevents them from accessing
DoS Attacks work by sending many requests to a website’s server, this causes it to
This means that the server will not be able to service the request from a legitimate
user.
DDoS Attacks
A Distributed Denial of Service attack is when many computers send many requests
Example
Internet Service Providers (ISP) provide a certain data quota for all users, so if the
attacker sends thousands of emails and fills up the inbox, the data quota will be filled
Prevention
We can use an up-to-date malware checker.
We can set up a firewall to restrict the traffic to & from a web server or system.
We can also set up email filters to filter out the unwanted emails.
DDoS Signs
There are signs we can check for to see if we have become a victim of DDoS.
The last is that the suer is receiving a huge amount of spam mail.
Hacking
It is the act of gaining illegal access to a computer without the user’s permission.
Encryption makes the data meaningless, but the hacker can still delete it.
Prevention
We can prevent hacking by using firewalls, usernames, strong passwords which are
Ethical Hacking
This is when companies authorise paid hackers the check the security measures and
Malware
Malware is software that is specifically designed to disrupt, damage, or gain
Viruses
Identity
They are programs or program code that replicate with the
Definition? intention of causing a computer malfunction and corrupting or
deleting files.
What It They can delete many important files and fill the hard drive with
Does useless data.
Most viruses need an active host program on the target
Activation computer/infected OS. They also have a trigger which causes the
virus to start destruction.
Where They Viruses come from many places, it is as email attachments or
Are infected websites or software.
Removal & Antivirus software removes them, and firewalls filter them out.
Prevention Be mindful of what you download and where you download it from.
Worms
Identity
They are a type of standalone malware which can self-replicate and
Definition? have the intention of spreading and corrupting all the computers on
the network.
They delete/edit data and inject other malicious software onto a
What It computer.
Does They also take advantage of security failures of the network to travel
to other computers on the network.
Activation No activation is needed, and they don’t need an active host program.
Where They
Worms can be found as email attachments and message attachments.
Are
Removal & Firewalls filter them out & antivirus remove them.
Prevention Be mindful of what you download.
Examples ILOVEYOU, Stuxnet, Nimda, Code Red, etc
Trojan Horses
Identity
They are programs which are disguised as legitimate software but
Definition? have malicious instruction embedded on them and have the intent of
doing some harm to the computer.
It is designed to damage, disrupt, steal, or inflict dome sort of harm
to a user’s data or network.
What It
They also can give criminals access to the victim’s personal
Does
information and can function as a gateway to download other
malicious programs (like spyware or ransomware).
Activation Need to be executed by the victim.
Where They Trojans can be found as email attachments and can be downloaded
Are from infected (dodgy) websites.
Removal & Antiviruses can remove trojans.
Prevention Be mindful of what you download & run.
Examples EGABTR, Back Orifice, ANOM, etc.
Spyware
Identity
This is software that gathers information by monitoring the user’s
Definition?
activities on his/her computer.
It gathers user interaction on a computer and sends it to the
What It cybercriminal who originally sent the spyware.
Does They are designed to monitor & capture web browsing (and other)
activities and capture personal data (like passwords).
Activation Activates when we run the software it comes along with.
Can come from many places, they can be injected by trojans,
Where
downloaded along with software, downloaded from suspicious sites,
They Are
etc.
Removal & Detected & removed by antivirus software.
Prevention Don’t download software from suspicious sites or emails.
Examples FinSpy, Huntbar, Pegasus, etc.
Adware
Identity
Software which automatically downloads and displays unwanted ads
Definition?
to a user.
It can flood a user’s screen with unwanted adverts, it can redirect
user’s browser to a website the adware promotes, etc.
What It It hijacks the browser and makes its own default search requests.
Does It doesn’t let antimalware software remove it as it is hard to
determine if it is harmful or not.
It highlights the weaknesses of a user’s defences.
Activation They are activated when we run the software it comes along with.
Where Generally downloaded along with software we download from the
They Are internet.
Removal & Antivirus software can remove it.
Prevention Be mindful of what you download & where you download it from.
Examples DeskAd, Look2Me, DollarRevenue, etc.
Ransomware
Identity
They are programs that encrypt the data on a user’s computer and
Definition?
asks user to pay a ransom to get the decryption key.
What It It encrypts user’s files and gives them the decryption key once the
Does cybercriminal’s demands have been met.
Activation No activation is needed.
Where
Comes from Trojans or Social Engineering.
They Are
Antimalware/anti-ransomware software quarantines the malicious
Removal &
software.
Prevention
Back up files regularly, antimalware software & monitoring software.
Examples Bad Rabbit, Reveton, WannaCry, etc.
Phishing
This is when a cybercriminal sends out a legitimate looking email to users.
The email can contain attachment or links which take you to a fake website and can
The email usually appears to be genuine coming from a known bank or service.
The key point is that the victim must do something so the scam can take place, if
the mails are deleted or not opened, they do not inflict any harm.
Prevention
No. Method
1 Be aware of the new phishing scams!
2 Do not click on any email links unless you know it is safe!
3 Run ant-phishing toolbars on browsers!
4 Check the protocol if it is https or not!
5 Check your online accounts, use strong passwords, and change them regularly!
6 Use up-to-date browser, run good desktop & network firewalls!
7 Make your browser block the popups or close them with the “X” button!
Pharming
This is malicious code installed on a user’s computer or on an infected website.
The malicious code redirects the user’s browser to a fake website when they enter the
URL.
Unlike phishing, pharming does not require user to do anything and can gain all the
Prevention
No. Method
1 Use anti-virus software!
2 Check the website spelling & the URL!
3 Ensure that the website uses HTTPs protocol!
4 Read the alerts that your browser shows you!
Social Engineering
This is when cybercriminals put the victim into a social situation which causes them
to let their guard down and give them their personal information.
Types of Threats
Threat Description
Instant Malicious links are embedded into instant messages that pop up
Messaging onto the user’s screen.
Done using popups that persuade the user to accept something
Shareware
which is generally infected.
Emails & When user receives a genuine looking email which redirects them to
Phishing a website which looks genuine but is a fake copy which tricks the
Scams user into entering their personal information.
This is when the cybercriminal leaves a memory stick (physical)
Baiting somewhere near the victim who puts it into his/her computer (to
see who the owner is) and unknowingly installs malicious software.
This is when the cybercriminal tricks the victim into giving the
Phone Calls
criminal control over their device (like those tech support scams).
The Process
Access Levels
Access levels are basically the different amounts of permission and restrictions users
have.
Users with higher access levels have more permission while the ones with less access
Uses
Databases
the data.
This can be done by having different views of the database (like master view and
reader view).
Social Networks
The user generally has privacy settings rather than passwords to decide the access
levels.
Anti-Malware
Most common ones are antiviruses and anti-spyware.
Anti-Spyware
This is software that detects & deletes spyware that were illegally installed onto a
user’s computer.
Methods
This is when the software looks for This is when the software checks for
certain features which are usually certain file structures which are
risks.
General Features
No. Feature
1 Detect & remove spyware installed on the device.
2 Prevent user from downloading spyware.
3 Encrypt files to ensure data security.
4 Encrypt key stroke data to remove key logger risks.
5 Block access to user’s webcam & mic to not let spyware take over.
6 Scan for signs if user’s personal information was stolen & inform user about it.
Authentication
This refers to the ability of a user to prove who they are.
Passwords are used on many occasions, like when accessing email account, when
Protecting Passwords
No. Method
1 Use anti-spyware to ensure nobody knows your passwords!
2 Change passwords regularly!
3 Passwords should not be straightforward or easy to crack.
Passwords must contain:
A number
4 A capital letter
A special character
At least 8 characters
All characters in a password are replaced with “*” so nobody can copy the user’s
password:
When either the user’s password or username is different from the correct data,
When users choose to create a new password, the system tends to ask them to re-
To prevent brute force attacks, users are allowed to enter their password a few
times.
Resetting Passwords
If user forgets the password of their account or they want to reset it, they want to
reset it.
An email is sent with a link to the webpage to reset their account’s password.
Biometrics
Biometrics are like passwords except that they are unique to every human being.
Fingerprints
The image of a fingerprint is compared to the one in the database which was
The system compares the patterns of ridges & patterns which are unique.
No. Advantage
1 Improved security as fingerprints are unique.
Very useful as fingerprints don’t get stolen or lost unlike other devices (i.e.,
2
security cards).
It is impossible to ‘sign in’ if there is only one person with the fingerprints of
3
the user.
No. Disadvantage
1 Expensive to install & set up.
2 Scanning accuracy can be affected if the user’s finger is injured.
3 People may regard biometric devices as “infringement of civil liberties.”
Retina Scans
Retina scans use infrared light to scan the unique blood vessels in the retina.
The only problem is that a person must still for like 10 seconds to scan their retina.
A person stands facing the retina scanner which sends the scanned data to the ADC
which coverts this data to digital data and then goes t a microprocessor which
compares the scanned data with the data stored in the database. If the 2 data sets
match, the microprocessor sends signal to turn the green light on and unlock the
door, the door is controlled by a DAC & an actuator. On the other hand, if the data
sets do not match, then access is denied, and the light remains red. (Memorize this)
2-Step Verification
This requires 2 methods of authentication to verify a user.
Mainly used when user makes online purchases using credit/debit card payment.
Let’s say Alucard decides to buy some little addons for his Jackal from a website.
Alucard would log in to the website using his username and password (step 1).
To improve security, an 8-digit pin (one time code) is sent to him via text message
or email.
Alucard enters the pin into the website and is now authorised to purchase parts for
Jackal.
This is done overnight or when you are logged off the device.
These updates are essential as they contain patches to improve the software’s
The only disadvantage is that it may disrupt your device after installation.
This can be fixed by downloading another patch or just restore the older version of
the software.
Firewalls
A firewall is either software or hardware
It sits between user’s system and external network (like the internet).
They let user decide if they want communication with external sources and notifies
Tasks
No. Task
1 Examine traffic between an internal network & an external network
2 Checks if incoming & outgoing data meets a set criteria.
Traffic that fails to meet the criteria is blocked & user is warned about
3
security issues
4 Firewall is used to log all incoming & outgoing traffic for later interrogation
Criteria can be set to prevent user from visiting undesirable sites and has a list
5
of the blocked Ips
6 Firewalls help prevent malware and hackers from entering the computer
Warns user if a software they have is trying to access external data sources
7
and is given choice to allow this or not
No. Description
1 Cannot prevent users on the internal network from bypassing firewall
2 Employee carelessness or misconduct cannot be prevented by firewall
3 Firewalls cannot do anything if user disables them
Proxy Servers
No. Feature
1 Allows traffic to be filtered and can block sites if needed
2 Keep user’s IP secret to improve security
3 Access to web server is allowed if the traffic is valid
4 Access to web server is denied if the traffic is invalid
5 Possible to block requests from certain IP addresses
6 Prevents direct web server access
7 Launched attacks hit the proxy server rather than user’s computer
8 Invalid traffic is directed away from web servers which adds protection
9 Cache allows webpages to load faster (they are downloaded on user’s first visit)
10 Function as firewalls
Privacy Settings
They are controls available on web browsers, social networks, etc.
They are designed to limit who can access user’s personal profile.
General Features
No. Feature
1 ‘Do Not Track’ option prevents sites from collecting and using browsing data
Check to see if payment methods were saved on site, this prevents user from
2
typing payment details every time
Safer Browsing, this means that browser alerts user if they opened a
3
dangerous website
4 Web browser privacy options (like history and cookies)
Web advertising opt-outs, this lets us prevent third parties from accessing or
5
browsing data for advertising purposes
6 Apps, to let or not let sites access information (like location)
Websites encrypt data with SSL, this means that only the user and the web server
SSL Certificates
Table of Contents
Note To Reader ............................................................................................................................... 2
Multitasking ........................................................................................................................... 10
EEPROM ................................................................................................................................. 12
CMOS ....................................................................................................................................... 12
Buffers ..................................................................................................................................... 14
General Features.................................................................................................................. 18
Note To Reader
These notes are made according to the 2023 – 2025 computer science
syllabus so if you have your examinations for 2022, you may want to refer to
other places.
Another thing is that I would advise you to use other resources to revise just to
be safe (these notes may be missing information here and there).
I would also advise you to practice past papers as they are helpful when
preparing!
That’s it for this note section thing so you can go to the actual content.
Functions: Functions:
1. Virus Checkers
2. Defragmentation Software
3. Disk content analysis & repair
4. File compression & management
5. Back-up software
6. Security
7. Screen savers
Defragmentation Software
This software takes all the data fragments scattered around on the hard drive
and rearranges them into contiguous sectors.
Backup Software
What it does:
OS Windows Mac OS
Utility Name File History Time Machine
Takes snapshots of files and
stores them on external HDD Erases contents of selected
regularly, this builds a library drive and replaces them
What It Does of past file versions which with back up. It is necessary
allows the user to choose to connect external drive is
which version they want to connected.
back up.
Every hour
Daily back-up for past
How Often It
Every hour (default) month
Saves
Weekly back-ups for
previous months
Security Software
What it does:
Screen Savers
They are programs that blank the screen or fill it with moving images when
the computer has been idle for a certain amount of time.
Screen savers also allow other programs to run in the background such as:
1. Virus scans
2. Distributed computer apps
Device Drivers
They are software that allow the communication between OS and peripheral
devices (like mouse or keyboard).
Computers store the OS on the HDD or the SSD as they are very large
programs.
Operating systems of mobile phones are stored on their SSD (they don’t have
HDD).
Functions of an OS:
Human
Computer
File Interface Security
Management
Hardware
Peripheral Functions Multitasking
Management
Interrupt
User Account
Handling
Management
Memory Routines
Management
Memory Management
Functions:
Security Management
Ensures the integrity, confidentiality, and availability of data by:
File Management
Main Tasks:
Multitasking
This allows computers to carry out more than one task at a time.
Each process taking place uses a fraction of the hardware resource, this is
monitored by the OS to ensure that the processes are running properly:
Admins
The management of the user accounts is generally overseed by an admin.
The admin/administrator can create and delete users and can also restrict
their activity on the system.
How It Works
When a computer starts:
1. Part of the OS is loaded into the RAM (this is called booting up or bootstrap
loading).
2. The start-up of the computer’s motherboard is handled by the BIOS (Basic
Input/Output System).
3. The BIOS then tells the system where the OS can be found.
4. The BIOS then loads the part of the OS that is required to be executed.
Firmware
The BIOS is referred to as firmware.
EEPROM
The BIOS is stored in a special ROM called EEPROM which stands for
“Electronically Erasable Programmable ROM”.
The EEPROM is a flash memory chip which means that its contents remain the
same even when the computer is turned off.
The only problem is that the user can rewrite, update, or even remove the
BIOS.
Note: You do not need to know a lot about EEPROM, just this much is enough.
CMOS
CMOS stands for “Complementary Metal Oxide Semi-conductor”.
The CMOS is charged with the battery on the motherboard, this means that if
the user had changed the settings, they will be set to the factory settings.
In The End…
The application software will be under the control of the OS and will need to
access system software when running. Different parts of the OS will need to be
loaded from the RAM as the software runs.
[4] Interrupts
An interrupt is a signal sent from a device or from a software to the
microprocessor.
The interrupt causes the microprocessor to stop temporarily and service the
interrupt.
1. Timing signals
2. Input/output processes: like printer requiring more data
3. User interactions: Like key presses or mouse movement
4. Software errors that cause problems: Like trying to divide by 0 or trying to
access memory space that is being used by other software
5. Hardware fault: Like paper is jammed in the printer
Buffers
A buffer is a memory area that stores data temporarily.
Mnemonic Meaning
LDA Gets the value of a variable and loads it into the accumulator.
STO Replaces the value of a variable with the value stored in the
accumulator.
ADD Adds the value of a variable with the variable in the accumulator.
[3] Translators
A translator is a utility program that translates the program into binary so it
can be run by a computer.
[5] IDEs
IDE stands for “Integrated Development Environment”.
General Features
Feature Description
Code Editor Allows program to be written and edited without needing
separate text editor.
Translator This can be an interpreter and/or a compiler to enable the
program to be executed.
The interpreter is used for developing and the compiler is
used to produce a final version which can be used.
Runtime This used to check if there are any logic errors as this shows
environment with us how all the values of all the variables change in runtime.
debugger We can also use breakpoints which stope code execution at a
certain point of the code.
Error diagnostics Dynamic error checking finds possible errors in the code as
& Auto correction we type, the error is pointed out and corrected
automatically by the IDE.
Auto Completion Context sensitive prompts with text completion for variable
names, functions, and other reserved words.
Auto-Documenter These are helpful guides that tell us about functions, syntax,
etc.
Pretty Typing This is when the IDE gives colour to the code in a
meaningful way as it can show or categorise something (like
functions are blue or strings are orange)
else: ELSE
/// ///
ENDIF
Python (case-sensitive) Pseudocode
For Loop For Loop
This loop would start from 0 and end at 9 (a total This loop would start from 0 and end at 10
count of 10)
For Loop For Loop
NEXT val
ENDFOR
This loop would start from 2 and end at 9 (range This loop would start from 2 and end at 10
function in Python works till n-1)
For Loop For Loop
NEXT val
ENDFOR
This loop would start from 1, end at 10 and This loop would start from 1, end at 10 and
increment the loop variable var by 2 instead of 1. increment the loop variable var by 2 instead of 1.
Python (case-sensitive) Pseudocode
In order to end the For loop for a condition In order to end the For loop for a condition
(Pseudocode does not have break or continue keywords)
for val in range(10):
x = int(input("Enter a value: ")) DECLARE x AS INTEGER
if(x>=0):
continue REPEAT
else: INPUT(“Enter a value: “), x
break UNTIL(x<0)
OR
ENDWHILE
While loop terminates as soon as you enter a While loop ends after 10 iterations and Repeat
negative value otherwise finishes for 10 iterations Until keeps repeating until user enters a value<0
Python (case-sensitive) Pseudocode
Taking input into the array Taking input into the array
Exam Technique
Know what the examiners can ask you questions about
Have a look at the I GCSE Computer Science syllabus that you have been studying and are going
to be taking the exam for. The list of topics will make a great checklist for your revision. If you
find something that you don’t understand or haven’t made any notes about, then find out about
it. A
nything that is mentioned in the syllabus could be used in an examination question.
Binary is the b
ase 2 number system. It is used in computer systems because computers store
data with the use of of switches that are in two states: on or off, 1 or 0.
b) Convert positive denary integers into binary and positive binary integers into denary
(a maximum of 16 bits will be used)
To convert binary (base 2) to denary (base 10) we use the following table. Adding up all of the
numbers where a ‘1’ bit occurs.
8-bit example:
Original number: 01101010
27 26 25 24 23 22 21 20
64 32 16 8 4 3 2 1
0 1 1 0 1 0 1 0
= 32 + 16 + 4 + 2 = 54
To convert denary (base 10) to binary (base 2) we use the same table, placing a 1 in the correct
positions until it adds up to the value we need.
c) show understanding of the concept of a byte and how the byte is used to measure
memory size
1 bit 1 1 bit
1 nibble 4 1 nibble
1 byte 8 1 byte
1 0 1 0 0 1 1 0
This means that motor A and B are both on. Motor B is rotating forward and motor A is rotating
backwards.
1.1.2 Hexadecimal
Hexadecimal is a base 16 number system that uses the digits 0 to 9 and the letters A to F to
represent each hexadecimal digit.
Denary, B
inary, H
exadecimal
0 1 2 3 4 5 6 7
0 1 2 3 4 5 6 7
8 9 10 11 12 13 14 15
8 9 A B C D E F
Hexadecimal:
● Is easier/quicker to read than binary
● Is easier/quicker to write/type than binary
● Takes up less room on the screen than binary
● Is easier to debug than binary
● Is less prone to human error than binary
c) convert positive hexadecimal integers to and from denary (a maximum of four
hexadecimal digits will be required)
To convert hexadecimal integers to and from denary it is often easier to go through binary. To
start, write out each hexadecimal digit as 4 binary bits. For example: 4AE would become 0100 1010
1110. Then convert the number to denary as described in 1.1.1 (b).
0100 1010 1110 = 1024 + 128 + 32 + 8 + 4 + 2 = 1198.
A register is a place to store a group of bits. We can use our knowledge of how to convert
between base 2, base 10 and base 16 to represent numbers stored in registers and main memory
as hexadecimal.
a) show understanding that sound (music), pictures, video, text and numbers are stored
in different formats
Video .3gp, .avi, .flv, .m4v, .mov, .mp4, .mpg, .vob, .wmv
Parity checks
Parity checks can be e ven (check for an even number of 1-bits) or o dd ( check for an odd number
of 1-bits). The bit that is added to make the even or odd total is known as the p arity bit. It is
possible that t wo errors in the data could result in an error not being detected.
Checksum
Data is sent in blocks. An additional value, called the checksum, is sent at the end of the block of
data. The checksum is calculated based on the number of bytes in the block of data. If the
checksum calculated at the receiver’s end doesn't match the checksum that is sent at the end of
the data block, then an error has occurred.
Echo Check
Data is transmitted. The data is then returned to the sender. The sender compares the data sent
with the data received back. If they are different then an error has occurred and the data needs
to be sent again.
c) show understanding of the concept of Musical Instrument Digital Interface (MIDI) files,
JPEG files, MP3 and MP4 files
MP3
MP3 uses lossy audio compression to store music in an MP3 file format. These can often be up to
90% smaller than comparable CD music files. The music quality is retained by removing sounds
that the human ear often can’t hear.
MP4 files are slightly different as they can often store video or photos and not just audio.
d) show understanding of the principles of data compression (lossless and lossy) applied
to music/ video, photos and text files
Data transmission is where digital data is transferred from one device or component to
another. Data transmission can be wireless (wifi, bluetooth, NFC, 3g/4G/5G etc.) , or send
along a physical medium, such as a copper network cable, fibre optic cable etc.
Serial data transmission i s where data is sent one bit at a time over a s ingle wire or channel.
Parallel data transmission i s where data is sent several bits at a time o ver multiple wires o r
channels.
Serial data transmission is slower than parallel, but is good for long distances as the data cannot
become skewed.
Parallel d ata transmission is faster than serial, but data can become skewed over long distances
(so is more suitable for short distances)
A parity bit is added to data to give it even or odd parity. It is usually added at the beginning or
the end of the data, or each byte of data. See 1.1.3 b).
g) show understanding of the use of serial and parallel data transmission, in Universal
Serial Bus (USB) and Integrated Circuit (IC)
As its name suggests, USB uses serial data transmission, an IC normally uses parallel data
transmission.
Firewalls
Firewalls can help stop unauthorised access from the internet by examining the traffic between a
user’s computer or local network and a public network (e.g. the internet).
A firewall:
● Monitors incoming and outgoing traffic on a network
● Checks whether incoming and outgoing traffic meet certain criteria, if data fails criteria, the
firewall blocks the traffic and warns the user
● can log all incoming and outgoing traffic
● Criteria can be set to prevent access to certain websites, this can be done by the firewall
keeping a list of all undesirable IP addresses (a blacklist)
● Warns the user if software tries to access an external data source
b) show understanding of the Internet risks associated with malware, including viruses,
spyware and hacking
Hacking
Hacking is a method of gaining unauthorised (and sometimes illegal) access to a computer
system. This can lead to identity theft and loss or corruption of data. The risk of hacking can be
minimised by using strong passwords and firewalls.
Cracking
Cracking is the editing of a program source code so that it can be exploited or changed for a
specific purpose (usually without the owner's consent, and therefore illegal). It is often done for
malicious purposes, e.g. removing password protection or removing the need for a licence to run
the software. It is often difficult to guard against; software engineers need to make it difficult to
identify ‘back doors’ (ways of breaking into the software).
Viruses
A virus is program code that can replicate or copy itself with the intention of deleting or
corrupting data or files, or causing the computer to malfunction in another way. They can cause
the computer to run slow (due to the hard disk filling up with data, or the processor being
directed to other tasks) or crash (due to missing critical files). The risk of viruses can be
minimised by running anti-virus software or not opening emails or software from unknown
sources.
Phishing
Legitimate-looking emails are sent to users; on opening the email, the user could be asked to
supply personal or financial details or they may be asked to click on a link which sends them to a
fake website where the user could be asked to supply personal data. Many email providers try to
filter out phishing emails and are largely successful, but some still slip through the filter. There are
a number of signs to look out for in phishing emails:
● Poor spelling and grammar
● A unexpected message asks for personal information
● You did not initiate the action or communication
● A message that makes unrealistic threats e.g. sending something to everyone in your
contact list.
● A message that makes unrealistic promises e.g. cash prizes, lottery winning etc.
Pharming
Malicious code that is installed on a users computer or web server. The code redirects the use to
a fake website without their knowledge (it may look exactly like the genuine website and even
appear to have the correct URL). Once the user is sent to the fake website they may be asked to
give out personal or financial data.
Some anti-spyware or antivirus software can identify and remove pharming code on a computer.
The user could also look for clues such as lack of encryption, strange looking URL, computer
running slow etc.
Wardriving
This is the act of locating and using wireless internet connections illegally. It can lead to stealing
of internet time and bandwidth, also other user’s passwords and other data. It can be prevented
with the use of strong wireless network security (e.g WEP).
c) explain how anti-virus and other protection software helps to protect the user from
security risks
Anti-virus software can scan for and detect viruses, quarantine viruses and delete viruses from a
computer system. It can be set to automatically scan new files, and periodically scan an entire
system. It will warn the user using an interrupt if it finds a virus. A f alse positive is when anti-virus
software flags something as a virus when it is not a virus.
Anti-spyware software can scan for and detect spyware. It will warn the user using an interrupt
if it detects spyware. It can delete spyware from a computer system.
Auto-Update software w ill download and install updates for your software as and when they
are available. It is good to keep programs updated as updates are often more secure
(vulnerabilities have been identified and fixed), more features have been added, or compatibility
may have been improved.
An i nternet browser is software which allows the user to display a web page on the computer
screen. The software interprets/translates the HTML from the website and shows the result.
An I SP is company that provides the user with access to the internet; they usually charge a
monthly fee. The ISP gives the user an account and sometimes provides the user with an email
address.
c) show understanding of what is meant by hypertext transfer protocol (http and https)
and HTML
Hypertext Transfer Protocol (http) is a set of rules that must be obeyed when transferring files
across the internet, this may include web pages or individual files. H
ttps indicates that the
protocol is using SSL encryption to send files or web pages securely.
HTML is used when writing and developing web pages. HTML uses <tags> to bracket pieces of
codes. Hexadecimal values are used to represent different colours in HTML. In HTML some tags
are used to define structure (these do not make much difference to the front-end of the website,
for example <head> and <body> tags). Other tags are used to define p resentation ( these are
used to define how items are displayed on the page, for example <b> would make text appear
bold.
e) show understanding of the concepts of MAC address, Internet Protocol (IP) address,
Uniform Resource Locator (URL) and cookies
MAC address
a media access control address is used to uniquely identify a device on a network. The first 6 hex
digits represent the manufacturer and the latter 6 are unique to that specific device. MAC
addresses can be UAA (a universally administered address) or LAA (a locally administered
address).
Cookies
Pieces of data which allow detection of web pages viewed by a user and to store their
preferences. Cookies can be deleted from the user’s desktop although this can remove some of
the features of certain websites.
b) understand and define the functions of NOT, AND, OR, NAND, NOR and XOR (EOR)
gates, including the binary output produced from all the possible binary inputs (all
gates, except the NOT gate, will have 2 inputs only)
d) recognise and use the standard symbols used to represent logic gates.
AND
A B A∧B
1 1 1
1 0 0
0 1 0
0 0 0
OR
A B AVB
1 1 1
1 0 1
0 1 1
0 0 0
NOT
A ¬A
1 0
0 1
NAND
A B ¬(A ∧ B)
1 1 0
1 0 1
0 1 1
0 0 1
NOR
A B ¬(A V B)
1 1 0
1 0 0
0 1 0
0 0 1
XOR
A B A⊻B
1 1 0
1 0 1
0 1 1
0 0 0
e) Produce truth tables for given logic circuits.
If you are asked to do this you will be given a space to show your working. It is a good idea to
annotate the circuit adding in some locations where you will work out the intermediate answers
before you evaluate your overall answer.
An example might be: The student has added in locations d and e to help them work out the
overall answer.
A B C D E X
0 0 0 0 0 0
0 0 1 0 1 1
0 1 0 0 0 0
0 1 1 0 0 0
1 0 0 0 0 0
1 0 1 0 1 1
1 1 0 1 0 1
1 1 1 1 0 1
f) Produce a logic circuit to solve a given problem or to implement a given written logic
statement.
This is perhaps one of the hardest things you will be asked to do. It is useful to annotate the
question (particularly if it is quite wordy) highlighting the key words such as AND, OR, NOT. It is
also worth annotating what value is meant by the wording in the question (for example it might
say “if the temperature is over 25 degrees” in logic terms, this means something like T=1).
1.3.2 Computer architecture and the fetch-execute cycle
a) show understanding of the basic Von Neumann model for a computer system and the
stored program concept (program instructions and data are stored in main memory
and instructions are fetched and executed one after another)
The Von Neumann model holds both programs and data in the memory. Data moves between
the memory unit and the processor.
A register is a high-speed storage area within the processor. All data must be in a register before
it can be processed. There are 5 registered used in the Von Neumann model: Memory Address
Register (MAR), the Memory Data Register (MDR), the Accumulator (ACC), the Program Counter
(PC) and the Current Instruction Register (CIR).
A bus is the connection used to move data around the processor and also send out control
signals to synchronise the internal operations. There are three different buses used: A ddress bus
(used to carry signals relating to addresses from the processor to the memory, it is
unidirectional), Data bus (this sends data between the processor, memory uni and the input and
output devices, it is bi-directional) and the Control bus ( this carried signals relating to control and
coordination of all activities within the computer; it can be unidirectional or bidirectional
depending on what it is connecting).
b) describe the stages of the fetch-execute cycle, including the use of registers and buses
a) describe the principles of operation (how each device works) of these input devices: 2D
and 3D scanners, barcode readers, Quick Response (QR) code readers, digital
cameras, keyboards, mice, touch screens, interactive whiteboards, microphones
2D Scanners
These convert hard-copy documents into an digital format which can be stored in a computer
memory. Scanners operate by using a scan head which moves across the document shining a
bright light which reflects and produces an image which is sent to a lens via a series of mirrors.
Applications of 2D scanner include: scanning passports at airports, scanning newspapers for
archives, scanning textbooks for digital reading, scanning worksheets to complete online.
3D Scanners
3D scanners scan solid objects and produce an electronic 3D image. They use light or lasers and
measure their reflections to calculate the dimensions of an object. 3D scanners produce a 3D
model of a solid object.
Barcode Readers
Barcodes consist of a series of dark and light lines of varying thickness. Each digit or character is
represented by a number of lines. A barcode reader uses light or a laser to detect the series of
lines and input this as a series of characters into the computer.
Advantages of using barcode readers include:
● Allows for automatic stock control
● Allows for faster checkouts in shops
● Can check customer’s buying habits and customise offers based on trends
● Less chance of errors at tills
Digital Cameras
Digital cameras contain a microprocessor which automatically:
● Adjust shutter speed
● Focus the lense(s)
● Operates the flash
● Adjusts the aperture
● Removes ‘red eye’
● Reduce hand shake
Etc.
Images are captured when light passes through the lens onto a light-sensitive cell, which is made
up of thousands of tiny elements to capture each pixel.
Keyboards/keypads
Keyboards are the most common input device. Keys are pressed by the operator to enter data
directly into the computer. When a key is pressed, it completes a circuit and a signal is sent to the
microprocessor which interprets which key has been pressed.
Pointing Devices
The most common pointing devices are the mouse and the trackpad. They are used to control a
cursor on a screen or to select options from menus. Other pointing devices include: interactive
whiteboards and graphics tablets.
Microphone
Microphones are used to input sound into a computer. When the microphone picks up sound, a
diaphragm vibrates producing an electric signal. A analogue to digital converter then converts
the signal into digital values which can be processed by the computer. Voice and speech
recognition systems both use microphones.
Touchscreens
Touchscreens allow selection to be made by simply touching an icon or menu option. They are
also use in many devices to allow an input via a ‘virtual keyboard’.
Mobile phones and tablets are some of the biggest users of touchscreen technology. The most
common systems are capacitive, infra-red or resistive.
How it works - Uses layers of glass - Uses glass and can - uses upper layer of
that act as a capacitor either detect heat or polyester and bottom
- When the top layer is uses infrared sensors to layer of glass
touched the current detect touch. - when top layer touched,
changes - microprocessor works it completes a circuit
- The microprocessor out where the screen - microprocessor works
works out the was touched based on out coordinates of where
coordinates of where sensor/heat data the screen was touched
the screen was touched.
Drawbacks - can only use bare - relatively expressive - poor visibility in strong
fingers or a conductive technology sunlight
stylus - heat-sensitive systems - doesn’t allow multi-touch
only allow bare fingers capability
to be used - screen is vulnerable to
scratches
b) describe how these principles are applied to real-life scenarios, for example: scanning
of passports at airports, barcode readers at supermarket checkouts, and touch
screens on mobile devices
Please see 1.3.3 a)
c) describe how a range of sensors can be used to input data into a computer system,
including light, temperature, magnetic field, gas, pressure, moisture, humidity, pH and
motion
Sensors
Sensors send data from the real world to a computer. They often require an analogue to digital
converter (ADC) to change the data into a format that the computer (or microprocessor) can
understand. Sensors form part of many monitoring or control systems.
d) describe how these sensors are used in real-life scenarios, for example: street lights,
security devices, pollution control, games, and household and industrial applications
Printers
The three most common types of printer are: laser, inkjet and dot matrix.
Inkjet - Use liquid ink system - very high quality of - ink is expensive to
which sprays ink onto printing buy and quickly runs
the paper line by line - suitable for printing out on a large print
as the paper moves photos run
through the printer. - inexpensive to buy - usually have small
- The ink system uses printer paper trays
either thermal bubble - can be noisy in
or piezoelectric operation compared
technologies. to laser printer
Dot Matrix Printer - Use a matrix of pins - not adversely - relatively expensive
which strike an inked affected by damp or to buy printer
ribbon to produce dusty atmospheres - poor print quality
characters in a matrix - allows use of - very noisy and very
on the paper. multipart stationery slow at printing
(i.e. carbon copies)
- allows use of
continuous/fan-folde
d stationery
3D Printer
3D printers produce an actual solid objects. They are built up in the printer in a number of think
layers. Can use a number of different materials: powdered resin, powdered metal, ceramic power,
plastic reel, or even paper. 3D printer have been used to make prosthetic limbs, aerospace parts,
fashion and art item and even to make parts that are no longer in production by conventional
manufacturing.
2D/3D Cutters
These are used to cut into materials to form 3D objects and are controlled by computers and
software (CAD/CAM). Common materials include glass, crystal, metal, plastics and wood.
Headphones/Loudspeakers
Headphones and loudspeakers convert analogue voltages into sound. If the output is form a
computer, the digital signals are first converted into analogue voltages using a digital to
analogue converter.
Actuators
An actuator is a component of a machine that is responsible for moving and controlling a
mechanism or system, for example by opening a valve.
Light Projectors
DLP (digital light projectors) use millions of micro mirrors which can switch on or off several
thousand times a second creating various shades of light. Colour filters allow the shades of light
to be converted into colours which are projected onto a large screen.
LCD p rojectors use chromatic-coated mirrors which reflect light at different wavelengths. The
light components pass through three LCD screens which are then recombined using a prism to
produce the colour image which is projected onto a large screen.
b) describe how these principles are applied to real-life scenarios, for example: printing
single items on demand or in large volumes; use of small screens on mobile devices
Please see 1.3.4 a)
Primary memory is memory that is directly accessed by the CPU, e.g. RAM, ROM.
Secondary memory is memory that is not directly accessed by the CPU, e.g. HDD, SSD and
offline storage (including CDs, DVDs and blu-rays). O
ff-line storage is memory that can be safely
removed from the computer.
b) describe the principles of operation of a range of types of storage device and media
including magnetic, optical and solid state
Magnetic s torage devices use a magnetised medium to store data. Whether a bit is magnetised
or not indicated is that bit is a 1 or a 0. Examples include magnetic tape, standard HDDs (hard
disk drives). They are generally cheap, but not that reliable as the system includes moving parts.
Optical s torage devices use a laser to read/write data stored on a disk. Red lasers are used to
read DVDs and CDs and a blue laser is used to read/write to a blu-ray disk. Bumps and pits are
recorded onto a track, which represent 1s and 0s.Most disks have a single track that starts in the
centre of the disk and spirals outwards, however, a DVD-RAM disk has tracks in concentric circles.
CDs typically store 700MB, DVDs 4.7GB and Blu-Ray discs 25GB. Dual layer DVDs store 8.5GB and
dual layer Blu-Ray disks store 50GB. Optical memory is susceptible to scratches on the surface
on the disk which can skew data, as the disk has be spun round at high speeds it is also
susceptible to mechanical failure due to moving parts.
Flash storage uses semiconductors to store data. Millions of transistors are either on or off which
represent the 1s and 0s. Flash memory is solid. There are no moving parts, unlike magnetic and
optical, this makes it more reliable. It is more expensive to manufacture than magnetic or optical
storage. SSD (solid state drives) use flash memory, as do USB flash drives and SD cards.
c) describe how these principles are applied to currently available storage solutions,
such as SSDs, HDDs, USB flash memory, DVDs, CDs and Blu-ray discs
See 1.3.5 b)
Files are measured using the measurements in 1.1.1 c). If you are asked to calculate the storage
requirements of a file you will be give all of the numbers you need in the question. They may ask
you to give your answer in a different form to that in the question (for example they may give
you a number of bits and ask you to work out the number of bytes). Image size is a popular
choice for this sort of question, it is important that you include the colour depth when calculating
this size ((height in pixels x width in pixels) x colour bit depth = total size). Be careful with units, and
simplify calculations where possible.
An o
perating system i s the software running in the background of a computer. It manages
many of the basic functions of the computer, including:
Not every computer requires an operating system, for example the microprocessors controlling
ovens or washing machines will not require one as they carry out simple, unchanging tasks.
An i nterrupt is a signal sent from a device or software to the processor requesting its attention.
The interrupt will cause the processor to temporarily stop what it is doing to service the interrupt.
Examples include: pressing ALT+CTRL+BREAK, a paper jam in a printer, or software trying to
divide by zero.
1.3.7 High- and low-level languages and their translators
a) show understanding of the need for both high-level and low-level languages
A computer program is a list of instructions that enable a computer to perform a specific task.
Computer programs can be written in high-level or low-level language depending on the task to
be performed. Low level languages access the processor and memory directly however high
level languages require translating into a low level language before they can run. Most programs
are written in high-level languages.
High-level languages e nable a programmer to focus on the problem to be solved and require no
knowledge of the hardware and instruction set of the processor that will be used. High-level
languages can be used on different types of computer.
Low-level languages r elate to the specific processor of a particular computer. Low-level
languages can refer to machine code or assembly language (which needs to be translates into
machine code).
b) show understanding of the need for compilers when translating programs written in a
high-level language
A compiler is a computer program that translates a program written in a high-level language into
machine code so that it can be directly used by a computer to perform a task. A compiler will
attempt to translate the entire code at once, and report all of the errors at the end, at once.
d) show understanding of the need for assemblers when translating programs written in
assembly language
1.4 Security
1.4.1
a) show understanding of the need to keep data safe from accidental damage, including
corruption and human errors
Data can be accidentally damaged by a number of external factors e.g. fire, accidental deletion,
accidental overwriting, hardware failure, software faults etc.
b) show understanding of the need to keep data safe from malicious actions, including
unauthorised viewing, deleting, copying and corruption
Malicious acts can also prevent data from being safe. Most accidental methods of data damage
can be done intentionally.
1.4.2
a) show understanding of how data are kept safe when stored and transmitted,
including:
i) use of passwords, both entered at a keyboard and biometric
Strong passwords are important. Weak passwords are easy to guess and use
common, easy to remember words or letters.
ii) use of firewalls, both software and hardware, including proxy servers
Firewalls are described in 1.2.2
iii) use of security protocols such as Secure Socket Layer (SSL) and Transport
Layer Security (TLS)
SSL i s a protocol (set of rules) used by computers to communicate with each other
across a network. It allows data to be send a received securely across a network,
including the internet. HTTPS indicated that SSL is being used. When a user wants to
access a website, the web browser asks the web server to identify itself, the web
server sends a copy of the SSL certificate which the web browser authenticates. If it
is OK then SSL data transfer beings between the user’s computer and the web
server.
TLS is similar to SSL but is more recent and more effective. Only recent web
browsers support TLS. It uses a record protocol and a handshake protocol.
iv) use of symmetric encryption (plain text, cypher text and use of a key) showing
understanding that increasing the length of a key increases the strength of the
encryption
Encryption can be symmetric:
● Uses a secret key; when the key is applied, the plain text goes through an
encryption algorithm to produce ciphertext. The recipient needs a key to then
decrypt the message back into plain text.
● The main risk is that the sender and recipient need the same key, which is
susceptible to being hacked or intercepted
Encryption can also be asymmetric:
● Asymmetric encryption uses public and private keys.
● The public key is available to everybody and the private key is only known to
the user.
● Both keys are needed to encrypt and decrypt messages
1.4.3
a) show understanding of the need to keep online systems safe from attacks including
denial of service attacks, phishing, pharming
A denial of service attack is an attempt at preventing users from accessing part of a network,
usually internet servers. They can prevent users from accessing certain websites or accessing
online services. This is achieved by the attacker flooding the network with useless traffic. For
example, sending thousands of requests to a website or sending out thousands of spam emails to
users ‘clogging up a system’.
1.4.4
a) describe how the knowledge from 1.4.1, 1.4.2 and 1.4.3 can be applied to real-life
scenarios including, for example, online banking, shopping
Make sure your answers to this sort of question relate directly to the context of the question. For
example, don’t mention internet security if the system in question is offline.
1.5 Ethics
a) Show understanding of computer ethics, including copyright issues and plagiarism.
Computer ethics is a set of principles set out to regulate the use of computers to stop unethical
things from happening. Copyright is a system to prevent somebody from copying something
without permission. Plagiarism is the act of copying somebody's work and claiming it is your own.
Free software - Users have the freedom to run, copy, change or adapt the software.
Freeware - Users can download free of charge, but it is subject to copyright laws so the user
cannot copy, change or adapt the software.
Shareware - Users are allowed to try out shareware free for a trial period. At the end of this
period, the user will be requested to pay a few. Sometimes the trial version does not have all of
the features of the full version.
- Addition of binary
With 3 digits-
With the addition there sometimes is an error when you add and that
can be while adding 8-bit binary you might end up with a 9-bit number.
This type of error is known as an overflow error. (The maximum denary
value of an 8-bit binary number is 255).Hence the generation of 9th
bit value shows an error.
Example-
Question- Convert a)38 b)125 to 8-bit binary numbers using the two’s
complement format.
Practice few more questions and this will be easy af. List of
questions- Covert -79.Conevert -69.
Topics to be covered-
Character sets, representation of sound, representation of bit map
images and data compression stuff.
ASCII codes.
Character sets-are a list of recognized characters that can be
represented and used by a computer. In a character set each character
is represented by a denary number, Binary number and Hexadecimal
number.
Unicode
Being able to represent only 256 characters is fine for the English
language, however, as we know there are many languages in the world
that use different letters e.g. Russian, Chinese...
Unicode uses 16 bits to represent each character, this allows for up
to 65,536 different characters to be represented... more than enough
for every language and some special characters. ☺
Advantages of unicode-
Unicode can support the characters from any language in the world
where ASCII can only support the Basic English language. The character
set of ASCII was about 128 characters, and the Unicode supports over
1,000,000 characters. The Unicode encoding standard supports up to 4
bytes for each of the characters.
Bitmap images
Bitmap files are images that are made up from a number of tiny square
Each pixel can only be one single colour at a time,each pixel can
area i.e. an image. The greater the number of pixels within a specific
Representation of an image
Bitmap images have each pixel represented with a binary number and
this binary number will correspond to a colour. For simple black and
white images like this only 1 bit is require to represent each pixel.
This is because 1 bit offers 2 different states 1 or 0.
As the image only has 2 colours, black and white, 1 bit is enough to
offer 2 different representations.
image it will increase its quality, however it will also increase the
file size as there will be more pixels each represented by bits (data)
improve the quality of the image, however it will also increase the
file size as each pixel will now be represented by more bits (data)
Formula- image resolution (in pixels) x colour depth (in bits) 8 bit =
1 byte
For sound it is- sample rate (in Hz) x sample resolution (in bits) x
The sounds that we hear and that can travel through the real world
discrete
Sound Sampling
In the image above you can see the red line which represents the
analogue sound wave. The black line represents the digital signal and
the sampling process.
Each time the black line meets the analogue wave, a sample is taken.
This sample is essentially a binary representation of a sound note.
The Y Axis represents the bit depth. In this case there are 16
different possible notes (0 - 16), to represent 16 different states
you need 4 bits. This means that each sample is 4 bits.
The X axis represents the sample frequency, samples are always taken
at a consistent, set frequency.
Sampling rate- is the number of sound samples taken per second. This
is measured in hertz (Hz).
In the above example. the bit depth is only 4 thus allowing for only
To achieve this we can increase the bit depth. Increasing the bit
depth will increase the accuracy of which the analogue wave can be
sampled.
Increasing the bit depth will increase the sound quality, but it will
also increase the file size as each sample will be represented by more
bits.
the sample frequency. The more frequently that you sample the
analogue wave, the less parts of the wave will be left out thus
Increasing the sample frequency will increase the sound quality, but
it will also increase the file size as there will now be more samples,
Lossless- Lossless compression does not remove any data from the file
instead it uses algorithms to spot patterns of similarly coloured
pixels. It then stores the pattern as an instruction so that the image
can be reconstructed to its original quality.
Example-
-> If we use this duck image as an example we can see that it has 4
00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00
With RLE the algorithm would count that there are 17 Green pixels and
For data like 'cdcdcdcdcd' the RLE is not very effective so we use a
flag. A flag data shows that there is repetition.
Works by taking out the samples of a sound wave that were outside of
the normal human hearing range. This in theory should not reduce
quality too much, but will decrease the file size. Know as Perceptual
Music Shaping and it is the method used for MP3 files
Topics to be covered-
The Header
The header contains information that allows the packet to reach the
correct destination and for the whole file to be correctly rebuilt
once all packets have been received. The key pieces of information
included in the header are:
The Payload
The payload is the section of the packet that holds the actual data
from the file segment that is being transmitted. The diagram below
shows the example for the packet transmitting section 213 of the
example beach image:
pieces (Packets).
● Upon receiving all of the packets, the recipient will use the
have been received and rebuild the file in the correct order.
router. Each router will determine which route the packet needs
What happens?
may not always be the shortest path that could be taken, since
The USB is now the most commonly used input/output port with modern
computers. This universal implementation makes for the very convenient
and easy interchangeability of peripheral devices.
Automatic recognition and setup- When a USB device is plugged in, the
computer will automatically determine what type of device it is and it
will load the correct driver software.
How it works:
Asymmetric Encryption-
The two keys involved in the process are both produced by the party
that wishes to securely receive data. These keys are:
Topics to be covered-
2) The width of address and data bus can also affect performance.
Embedded Systems
-> These are not programmable by user they are already programmed
by the manufacturer. It can be possible to update the software
though. This can be done by connecting them to your PC.
Data Storage
Benefits of SSD
Benefits-
Using HDD for virtual memory cause problem such as disk thrashing. As
main memory fills data needs to be swapped frequently leading to very
high rate of reading and writing movement(this is known as disk
thrashing).
More time is eventually spent moving data out of memory and processing
it this will reduce PC performance and will come a point where
everything will come to halt as the system gets busy ‘moving’ the
data.This is known as thrash point.
CLOUD STORAGE
Cloud Storage i
Data Redunduncy- Storing the same data on more than one server in
case of maintenance and repair to let the people access it
anytime.
3 common systems
Some risks-
● The XEN security threat which forced many cloud operators ro
reboot all cloud server.Problem cause by XEN hyoervisor
● Hackers can gain access to your account and sell your photos
personal sensitive information
● Cloud service provider lost data during back up routine.
WNIC (wireless) does the same job but allows wireless connectivity by
having antenna itself.
UAA is the most common and it’s set at the manufacturing time in the
factory. Rare for user to want to change it.
The address can be changed but will cause problems if not unique.
There are a few reasons why the MAC address needs to be changed
using LAA:
● To solve the problem we have IPv6 which has 128 bits in eight
groups and uses HEX code
● allows the internet to grow in terms of the number of hosts and
potential increase in the amount of data traffic
● Advantages over IPv4 are
● removes the risk of IP address collisions
● » has built-in authentication checks
● » allows for more efficient packet routes
Dynamic Ip addresses are assigned by the ISP each time a device logs
onto the internet.This is done using DHCP (Dynamic Host configuration
protocol).A device with this changes IP address with every login.
Routers
INSTRUCTION SET
Each CPU only has a limited number of opcodes available to them and
the available opcodes is what is referred to as the instruction set.
Registers
BUS
A bus is a high-speed internal connection. Buses are used to send
control signals and data between the processor and other components.
Cache
It uses a CPU which can directly access the memory. The computer memory
can store data as well as instructions. These instructions could be
fetched, decoded and then executed in a sequential order.
- Data stored on circular disks called platters which are divided into tracks and sectors - Spindle
rotates the platters under the read/write heads - Read/write heads access and add data to the
platters using electromagnets - Slower than SSD because of longer access time - Usually larger
storage than SSD - Less expensive than SSD
AS Computer Science Table of Contents 9/14/2023
Table of Contents
Table of Contents ............................................................... 1
Data Representation ............................................................. 3
Number Systems ................................................................ 3
Binary Numbering System ....................................................... 3
Conversions ................................................................. 3
Addition & Subtraction ...................................................... 5
Measurement of the Size of Computer Memories ................................ 9
Hexadecimal System ............................................................ 9
Converting Hexadecimal to Binary ............................................ 9
Converting Binary to Hexadecimal ........................................... 10
Use(s) of the Hexadecimal System ........................................... 10
Binary Coded Decimal (BCD) System ............................................ 11
Half Byte Method ........................................................... 11
Complete Byte Method ....................................................... 11
Uses of BCD ................................................................ 11
BCD Addition ............................................................... 12
ASCII & Unicode .............................................................. 12
Standard ASCII ............................................................. 12
Extended ASCII ............................................................. 12
Unicode .................................................................... 13
Multimedia ..................................................................... 13
Bit-map Images ............................................................... 13
Storing Bit-map Images ..................................................... 13
File Header ................................................................ 14
Vector Graphics .............................................................. 15
Vector Graphics vs Bit-map Images .......................................... 15
How to choose between the two .............................................. 16
Sound Files .................................................................. 16
Sound Varies ............................................................... 17
Vocabulary Time! ........................................................... 17
Pros & Cons of High Sampling Rate/Resolution ............................... 17
Data Representation
Number Systems
There are 3 main number systems which we need to be aware of.
We have already learnt this in IGCSE so I will summarize most of it into this
nifty little table:
Name Binary Denary Hexadecimal
Base Base-2 Base-10 Base-16
Example Uses Computers Everyday language Color codes
What does “base” mean?
When we say “base”, we are referring to the number of digits used by the
numbering system.
For example, the denary system is base 10 meaning it can use 10 digits (0 – 9).
Conversions
Binary to Denary
Let’s say we want to convert 11010001 to denary:
1 1 0 1 0 0 0 1
Now, write down the weightings above the digits:
128 64 32 16 8 4 2 1
1 1 0 1 0 0 0 1
Now, we multiply the weight values with the binary values:
128 64 32 16 8 4 2 1
1 1 0 1 0 0 0 1
128 64 0 16 0 0 0 1
Finally, add up the final values:
128 + 64 + 16 + 1 = 209
Now, the trick is to take the biggest weight which is smaller than the value and
put a one there.
In this case, 128 is the biggest weight which fits into 156.
128 64 32 16 8 4 2 1
1
Now, subtract the weight you chose in step one and then find the biggest weight
which is smaller than the answer.
In this case, 156 – 128 is 28.
The biggest weight which can fit in the number 28 is 16.
128 64 32 16 8 4 2 1
1 1
Now, do step 2 over and over until we have nothing left.
So, 28 – 16 = 12 and the largest weight which goes in 12 is 8.
12 – 8 is 4 and the largest weight which fits into 4 is 4.
So we end up with:
128 64 32 16 8 4 2 1
1 1 1 1
Now, fill the rest of the empty spaces with 0:
128 64 32 16 8 4 2 1
1 0 0 1 1 1 0 0
This means that the binary for 156 is 10011100.
Hexadecimal System
This system is very similar to the binary system with the only difference being
that it uses powers of 16.
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16
0 1 2 3 4 5 6 7 8 9 A B C D E F
0 0 0 0 = 0 0 0 1 0 = 2 0 1 0 0 = 4 0 1 1 0 = 6 1 0 0 0 = 8
0 0 0 1 = 1 0 0 1 1 = 3 0 1 0 1 = 5 0 1 1 1 = 7 1 0 0 1 = 9
These codes are stored in 2 ways:
Uses of BCD
BCD is used mainly to represent and perform operations on numbers.
BCD is used in accounting systems, calculators, clocks, etc.
One common question is that why not just use binary addition instead?
Well, the answer is that binary addition isn’t entirely accurate which is why we
do not use it in our systems (failing math exams because of your calculator is
nightmare fuel).
Instead, we use BCD which is much more accurate as compared to binary addition.
Extended ASCII
This character set is different to the standard ASCII set:
→ Consists of 8 bit codes (takes more space than standard ASCII).
→ Supports more languages (mainly European).
Multimedia
Bit-map Images
Bit-map image is an image made up of pixels stored in a 2D matrix.
A pixel is simply the smallest picture element which makes up an image.
The main difference between the two is that colour depth is related only to
colour but bit depth has many uses with a range to different file formats.
By Sarem Tahir Information Representation and Multimedia Page 13
AS Computer Science Multimedia 9/14/2023
Image Resolution vs Screen Resolution
Image resolution Screen resolution
This refers to the number of pixels it This refers to the number of horizontal
takes to form an image. and vertical pixels used to make the
screen display.
The formula for this is:
𝐻𝑒𝑖𝑔ℎ𝑡 𝑊𝑖𝑑𝑡ℎ 𝐼𝑚𝑎𝑔𝑒 The formula for this is:
× =
(𝑖𝑛 𝑝𝑖𝑥𝑒𝑙𝑠) (𝑖𝑛 𝑝𝑖𝑥𝑒𝑙𝑠) 𝑅𝑒𝑠𝑜𝑙𝑢𝑡𝑖𝑜𝑛 𝑆𝑐𝑟𝑒𝑒𝑛 𝐻𝑒𝑖𝑔ℎ𝑡 𝑆𝑐𝑟𝑒𝑒𝑛 𝑊𝑖𝑑𝑡ℎ 𝑆𝑐𝑟𝑒𝑒𝑛
× =
(𝑖𝑛 𝑝𝑖𝑥𝑒𝑙𝑠) (𝑖𝑛 𝑝𝑖𝑥𝑒𝑙𝑠) 𝑅𝑒𝑠𝑜𝑙𝑢𝑡𝑖𝑜𝑛
For example, if we have a logo with the
resolution of 500x500, the image For example, a display with the
resolution would be 500 × 500 which is resolution of 1920x1080, the screen
250,000 pixels. resolution would be 1920 × 1080 which
gives us 2,073,600.
The main difference between the two is that image resolution stays the same
(unless we reduce the resolution with compression) and is related only to the
image, screen resolution is related to the display and may change for computer to
computer (there are many resolutions from 800x600 to 1920x1080).
What Does Changing Resolution Do?
Resolution Type Change Effect
1. If the screen resolution was less than the image
Resolution
resolution before, then the image would become
Screen Increase
less fuzzy.
Resolution
Resolution 1. May become fuzzy if the screen resolution is less
Decrease than the image resolution.
Resolution 1. Image becomes clearer and carries more detail.
Increase 2. File size increases.
Image
1. Image quality may reduce due to lower resolution
Resolution Resolution
as the amount of pixels for the image is less.
Decrease
2. File size decreases.
Calculating File Size
To calculate the file size of an image, we use the following formula:
𝐹𝑖𝑙𝑒 𝑆𝑖𝑧𝑒 (𝑖𝑛 𝑏𝑖𝑡𝑠) = 𝑅𝑒𝑠𝑜𝑙𝑢𝑡𝑖𝑜𝑛 × 𝐵𝑖𝑡 𝐷𝑒𝑝𝑡ℎ
To find Bit Depth, we use the formula: To find resolution we use the formula:
𝑁𝑢𝑚𝑏𝑒𝑟 𝑜𝑓 𝐵𝑖𝑡𝑠 = 2𝐵𝑖𝑡 𝐷𝑒𝑝𝑡ℎ 𝐻𝑒𝑖𝑔ℎ𝑡 𝑊𝑖𝑑𝑡ℎ
𝑅𝑒𝑠𝑜𝑙𝑢𝑡𝑖𝑜𝑛 = × (𝑖𝑛
(𝑖𝑛 𝑝𝑖𝑥𝑒𝑙𝑠) 𝑝𝑖𝑥𝑒𝑙𝑠)
File Header
When we save a bit-map image, we need to include a file header which contains
items such as file type, file size, image resolution, etc.
Sound Files
Sound requires a medium through which it travels through, this is because sound
is transmitted by cause oscillations of particles within the medium.
Our ears pick up these oscillations and interpret them as sound.
Each sound wave has the following:
1. Frequency
2. Wavelength
3. Amplitude (determines the loudness of the sound)
Vocabulary Time!
Sampling Resolution: Number of bits used to represent sound amplitude (bit rate).
Sample Rate: Number of sound samples taken per second.
File Compression
Lossless & Lossy Compression
Lossless Lossy
This compression technique makes it so This compression technique deletes all
that we can decompress the file to get the data which does not contribute in
it original form back. making the original detail.
Examples include spreadsheets or Examples include mp3 files, mp4 files,
lossless JPEG. etc.
Applications
MPEG-3 or MP3 (Audio)
MP3 uses many audio compression techniques which allow us to reduce the final
file’s size to 90% of the original and gives us an mp3 file.
MP3 files are played by various devices such as music player, phones, computers,
etc.
While they do reduce the file size, they also reduce audio quality.
Obviously, this loss of quality is hardly noticeable but an mp3 file can never
match up to the quality of an original CD or DVD.
Perpetual Music Shaping
This is one of the techniques we use and it does the following:
Name Description
Removal of This is when we remove sounds which are outside the hearing
unneeded sounds range of humans.
This happens in sections where 2 or more sounds are played, we
Removal of Soft
simply remove the softer ones as they are masked by the louder
Sounds
ones.
Reduce the
sampling rate
Crop the image
Introduction ...................................................................................................................................................... 2
How should teachers use this guide? ............................................................................................................ 2
1. Pseudocode in examined components ..................................................................................................... 3
1.1 Font style and size ................................................................................................................................... 3
1.2 Indentation ............................................................................................................................................... 3
1.3 Case and italics ....................................................................................................................................... 3
1.4 Lines and numbering ............................................................................................................................... 4
1.4 Comments ............................................................................................................................................... 4
2. Variables, constants and data types ......................................................................................................... 5
2.1 Atomic type names .................................................................................................................................. 5
2.2 Literals ..................................................................................................................................................... 5
2.3 Identifiers ................................................................................................................................................. 5
2.4 Assignments ............................................................................................................................................ 5
3. Arrays ........................................................................................................................................................... 7
3.1 Declaring arrays ....................................................................................................................................... 7
3.2 Using arrays ............................................................................................................................................. 7
4. Common operations .................................................................................................................................... 8
4.1 Input and output ....................................................................................................................................... 8
4.2 Arithmetic operations ............................................................................................................................... 8
4.3 Logic operators ........................................................................................................................................ 8
5. Selection ....................................................................................................................................................... 9
5.1 IF statements ........................................................................................................................................... 9
5.2 CASE statements .................................................................................................................................... 9
6. Iteration ....................................................................................................................................................... 11
6.1 Count-controlled (FOR) loops ................................................................................................................ 11
6.2 Post-condition (REPEAT UNTIL) loops ................................................................................................. 11
6.3 Pre-condition (WHILE) loops ................................................................................................................. 12
7. Index of symbols and keywords .............................................................................................................. 13
1. Pseudocode in examined components
The following information sets out how pseudocode will appear within the examined components and is
provided to allow you to give learners familiarity before the exam.
1.2 Indentation
Lines are indented by four spaces to indicate that they are contained within a statement in a previous line.
Where it is not possible to fit a statement on one line any continuation lines are indented by two spaces. In
cases where line numbering is used, this indentation may be omitted. Every effort will be made to make sure
that code statements are not longer than a line of code, unless this is absolutely necessary.
Note that the THEN and ELSE clauses of an IF statement are indented by only two spaces (see Section 5.1).
Cases in CASE statements are also indented by only two places (see Section 5.2).
Identifiers are in mixed case (sometimes referred to as camelCase or Pascal case) with uppercase letters
indicating the beginning of new words, for example NumberOfPlayers.
Meta-variables – symbols in the pseudocode that should be substituted by other symbols – are enclosed in
angled brackets < > (as in Backus-Naur Form). This is also used in this guide.
Example – meta-variables
REPEAT
<Statements>
UNTIL <condition>
Where the pseudocode contains descriptions rather than code symbols, keywords or literals, these are
written in italics.
Example – descriptions
REPEAT
<Statements>
UNTIL all seats are allocated
Line numbers are consecutive, unless numbers are skipped to indicate that part of the code is missing. This
will also be clearly stated.
Each line representing a statement is numbered. However when a statement runs over one line of text, the
continuation lines are not numbered.
1.4 Comments
Comments are preceded by two forward slashes // . The comment continues until the end of the line. For
multi-line comments, each line is preceded by //.
Normally the comment is on a separate line before, and at the same level of indentation as, the code it refers
to. Occasionally, however, a short comment that refers to a single line may be at the end of the line to which
it refers.
2.2 Literals
Literals of the above data types are written as follows:
2.3 Identifiers
Identifiers (the names given to variables, constants, procedures and functions) are in mix case. They can
only contain letters (A–Z, a–z) and digits (0–9). They must start with a letter and not a digit. Accented letters
and other characters, including the underscore, should not be used.
As in programming, it is good practice to use identifier names that describe the variable, procedure or
function they refer to. Single letters may be used where these are conventional (such as i and j when
dealing with array indices, or X and Y when dealing with coordinates) as these are made clear by the
convention.
Identifiers should be considered case insensitive, for example, Countdown and CountDown should not be
used as separate variables.
2.4 Assignments
The assignment operator is ←.
<identifier> ← <value>
The identifier must refer to a variable (this can be an individual element in a data structure such as an array
or an abstract data type). The value may be any expression that evaluates to a value of the same data type
as the variable.
Example – assignments
Counter ← 0
Counter ← Counter + 1
TotalToPay ← NumberOfHours * HourlyRate
3. Arrays
One-dimensional arrays are declared as follows (where l is the lower bound and n is the upper bound):
StudentNames[1] ← "Ali"
NoughtsAndCrosses[2] ← 'X'
StudentNames[n+1] ← StudentNames[n]
Arrays can be used in assignment statements (provided they have same size and data type). The following
is therefore allowed:
SavedGame ← NoughtsAndCrosses
A statement should not, however, refer to a group of array elements individually. For example, the following
construction should not be used.
Instead, an appropriate loop structure is used to assign the elements individually. For example:
FOR Index = 1 TO 30
StudentNames[Index] ← ""
NEXT Index
4. Common operations
INPUT <identifier>
The identifier should be a variable (that may be an individual element of a data structure such as an array, or
a custom data type).
OUTPUT <value(s)>
Several values, separated by commas, can be output using the same command.
INPUT Answer
OUTPUT Score
OUTPUT "You have ", Lives, " lives left"
Note that the syllabus for IGCSE (0478) gives READ and PRINT as examples for INPUT and OUTPUT
respectively.
+ Addition
- Subtraction
* Multiplication
/ Division
Care should be taken with the division operation: the resulting value should be of data type REAL, even if the
operands are integers.
The integer division operators MOD and DIV can be used. However, their use should be explained explicitly
and not assumed.
Multiplication and division have higher precedence over addition and subtraction (this is the normal
mathematical convention). However, it is good practice to make the order of operations in complex
expressions explicit by using parentheses.
In complex expressions it is advisable to use parentheses to make the order of operations explicit.
5. Selection
5.1 IF statements
IF statements may or may not have an ELSE clause.
IF <condition>
THEN
<statements>
ENDIF
IF <condition>
THEN
<statements>
ELSE
<statements>
ENDIF
Note that the THEN and ELSE clauses are only indented by two spaces. (They are, in a sense, a continuation
of the IF statement rather than separate statements).
When IF statements are nested, the nesting should continue the indentation of two spaces. In particular,
run-on THEN IF and ELSE IF lines should be avoided.
CASE OF <identifier>
<value 1> : <statement>
<value 2> : <statement>
...
ENDCASE
CASE OF <identifier>
<value 1> : <statement>
<value 2> : <statement>
...
OTHERWISE <statement>
ENDCASE
It is best practice to keep the branches to single statements as this makes the pseudocode more readable.
Similarly single values should be used for each case. If the cases are more complex, the use of an IF
statement, rather than a CASE statement, should be considered.
Each case clause is indented by two spaces. They can be seen as continuations of the CASE statement
rather than new statements.
Note that the case clauses are tested in sequence. When a case that applies is found, its statement is
executed and the CASE statement is complete. Control is passed to the statement after the ENDCASE. Any
remaining cases are not tested.
If present, an OTHERWISE clause must be the last case. Its statement will be executed if none of the
preceding cases apply.
INPUT Move
CASE OF Move
'W': Position ← Position – 10
'S': Position ← Position + 10
'A': Position ← Position – 1
'D': Position ← Position + 1
OTHERWISE : Beep
ENDCASE
6. Iteration
The identifier must be a variable of data type INTEGER, and the values should be expressions that evaluate
to integers.
The variable is assigned each of the integer values from value1 to value2 inclusive, running the
statements inside the FOR loop after each assignment. If value1 = value2 the statements will be executed
once, and if value1 > value2 the statements will not be executed.
It is good practice to repeat the identifier after NEXT, particularly with nested FOR loops.
The increment must be an expression that evaluates to an integer. In this case the identifier will be
assigned the values from value1 in successive increments of increment until it reaches value2. If it goes
past value2, the loop terminates. The increment can be negative.
Total = 0
FOR Row = 1 TO MaxRow
RowTotal = 0
FOR Column = 1 TO 10
RowTotal ← RowTotal + Amount[Row,Column]
NEXT Column
OUTPUT "Total for Row ", Row, " is ", RowTotal
Total ← Total + RowTotal
NEXT Row
OUTPUT "The grand total is ", Total
REPEAT
<Statements>
UNTIL <condition>
The statements in the loop will be executed at least once. The condition is tested after the statements are
executed and if it evaluates to TRUE the loop terminates, otherwise the statements are executed again.
REPEAT
OUTPUT "Please enter the password"
INPUT Password
UNTIL Password = "Secret"
WHILE <condition> DO
<statements>
ENDWHILE
The condition is tested before the statements, and the statements will only be executed if the condition
evaluates to TRUE. After the statements have been executed the condition is tested again. The loop
terminates when the condition evaluates to FALSE.
The statements will not be executed if, on the first test, the condition evaluates to FALSE.